- Aug 30, 2013
-
-
Kyle L. Huff authored
-
Steve Holme authored
-
Daniel Stenberg authored
Added missing $
-
Steve Holme authored
-
- Aug 29, 2013
-
-
Daniel Stenberg authored
... when doing upload it would return the wrong values at times. This commit attempts to cleanup the mess. Bug: http://curl.haxx.se/mail/lib-2013-08/0109.html Reported-by: Mike Mio
-
Daniel Stenberg authored
When removing an already removed handle, avoid that to ruin the internals and just return OK instead.
-
Steve Holme authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
'struct monitor', introduced in 6cf8413e, already exists in an IRIX header file (sys/mon.h) which gets included via various standard headers by lib/easy.c cc-1101 cc: ERROR File = ../../curl/lib/easy.c, Line = 458 "monitor" has already been declared in the current scope. Reported-by: Tor Arntsen
-
Steve Holme authored
-
- Aug 28, 2013
-
-
Steve Holme authored
Corrected the call to logmsg() in the IMAP SEARCH handler from commit 4ae7b7ea as it should have been outputting the what argument and not the test number.
-
Daniel Stenberg authored
-
Steve Holme authored
-
Steve Holme authored
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
Steve Holme authored
-
- Aug 27, 2013
-
-
Daniel Stenberg authored
When we introduced curl_easy_perform_ev, this got a slightly modified call trace. Without this, test 165 causes a false positive valgrind error.
-
Daniel Stenberg authored
Without this, test 165 triggers a valgrind error when ran with curl_easy_perform_ev
-
Daniel Stenberg authored
When waiting for a 100-continue response from the server, the Curl_readwrite() will refuse to run if called until the timeout has been reached. We timeout code in multi_socket() allows code to run slightly before the actual timeout time, so for test 154 it could lead to the function being executed but refused in Curl_readwrite() and then the application would just sit idling forever. This was detected with runtests.pl -e on test 154.
-
Steve Holme authored
-
Steve Holme authored
warning: implicit declaration of function 'checkpasswd'
-
Steve Holme authored
Moved the calls to checkpasswd() out of the getparameter() function which allows for any related arguments to be specified on the command line before or after --user (and --proxy-user). For example: --bearer doesn't need to be specified before --user to prevent curl from asking for an unnecessary password as is the case with commit e7dcc454.
-
- Aug 26, 2013
-
-
Steve Holme authored
-
Kyle L. Huff authored
Added the --bearer option to the help output
-
Kyle L. Huff authored
Added the ability to specify an XOAUTH2 bearer token [RFC6750] via the --bearer option. Example usage: curl --url "imaps://imap.gmail.com:993/INBOX/;UID=1" --ssl-reqd --bearer ya29.AHES6Z...OMfsHYI --user username@example.com
-
Steve Holme authored
warning: 'variable' may be used uninitialized in this function
-
Daniel Stenberg authored
I brought back security.h in commit bb552933. As we actually already found out back in 2005 in commit 62970da6, the file name security.h causes problems so I renamed it curl_sec.h instead.
-
Daniel Stenberg authored
The specified curl binary will then be used to verify the running server(s) instead of the development version. This is very useful in some cases when the development version fails to verify correctly as then the test case may not run at all. The actual test will still be run with the "normal" curl executable (unless the test case specifies something differently).
-
Kyle L. Huff authored
Added the ability to use an XOAUTH2 bearer token [RFC6750] with SMTP for authentication using RFC6749 "OAuth 2.0 Authorization Framework". The bearer token is expected to be valid for the user specified in conn->user. If CURLOPT_XOAUTH2_BEARER is defined and the connection has an advertised auth mechanism of "XOAUTH2", the user and access token are formatted as a base64 encoded string and sent to the server as "AUTH XOAUTH2 <bearer token>".
-
Kyle L. Huff authored
Added the ability to use an XOAUTH2 bearer token [RFC6750] with IMAP for authentication using RFC6749 "OAuth 2.0 Authorization Framework". The bearer token is expected to be valid for the user specified in conn->user. If CURLOPT_XOAUTH2_BEARER is defined and the connection has an advertised auth mechanism of "XOAUTH2", the user and access token are formatted as a base64 encoded string and sent to the server as "A001 AUTHENTICATE XOAUTH2 <bearer token>".
-
Steve Holme authored
ISO C forbids forward references to 'enum' types
-
- Aug 25, 2013
-
-
Daniel Stenberg authored
The old numbers would still redirect but who knows for how long...
-
Kyle L. Huff authored
Added the ability to specify an XOAUTH2 bearer token [RFC6750] via the option CURLOPT_XOAUTH2_BEARER for authentication using RFC6749 "OAuth 2.0 Authorization Framework".
-
Kyle L. Huff authored
Added the ability to generated a base64 encoded XOAUTH2 token containing: "user=<username>^Aauth=Bearer <bearer token>^A^A" as per RFC6749 "OAuth 2.0 Authorization Framework".
-
Daniel Stenberg authored
We've announced this pending removal for a long time and we've repeatedly asked if anyone would care or if anyone objects. Nobody has objected. It has probably not even been working for a good while since nobody has tested/used this code recently. The stuff in krb4.h that was generic enough to be used by other sources is now present in security.h
-
Daniel Stenberg authored
-
- Aug 24, 2013
-
-
Daniel Stenberg authored
Several language fixes. Several reformats that should make the HTML generation of this document look better. Reported-by: Dave Thompson
-
- Aug 23, 2013
-
-
Daniel Stenberg authored
-